about summary refs log tree commit diff
path: root/modules/services/sourcegraph
diff options
context:
space:
mode:
authorFranck Cuny <franck@fcuny.net>2022-05-22 14:46:25 -0700
committerFranck Cuny <franck@fcuny.net>2022-05-22 15:09:49 -0700
commitaff15167063120dd25240a9478853077d89886ce (patch)
treea43c05bd3c1f15c0df7bb2252535ee5cfb4bd090 /modules/services/sourcegraph
parentfeat(dns): add cs.fcuny.xyz (diff)
downloadworld-aff15167063120dd25240a9478853077d89886ce.tar.gz
feat(modules): create a module for sourcegraph
Run sourcegraph ([0]) in a docker container. It's exposed as
cs.fcuny.xyz, and we backup some of the directories.

[0] https://docs.sourcegraph.com
Diffstat (limited to 'modules/services/sourcegraph')
-rw-r--r--modules/services/sourcegraph/default.nix46
1 files changed, 46 insertions, 0 deletions
diff --git a/modules/services/sourcegraph/default.nix b/modules/services/sourcegraph/default.nix
new file mode 100644
index 0000000..adf7051
--- /dev/null
+++ b/modules/services/sourcegraph/default.nix
@@ -0,0 +1,46 @@
+{ config, pkgs, lib, ... }:
+let
+  cfg = config.my.services.sourcegraph;
+  secrets = config.age.secrets;
+in {
+  options.my.services.sourcegraph = with lib; {
+    enable = mkEnableOption "sourcegraph server";
+    vhostName = mkOption {
+      type = types.str;
+      example = "cs.fcuny.net";
+      description = "Name for the virtual host";
+    };
+  };
+
+  config = lib.mkIf cfg.enable {
+    virtualisation.oci-containers.containers.sourcegraph = {
+      image = "sourcegraph/server:3.31.2";
+
+      ports = [ "127.0.0.1:7080:7080" ];
+
+      volumes = [
+        "/var/lib/sourcegraph/etc:/etc/sourcegraph"
+        "/var/lib/sourcegraph/data:/var/opt/sourcegraph"
+      ];
+
+      # Sourcegraph needs a higher nofile limit, it logs warnings
+      # otherwise (unclear whether it actually affects the service).
+      extraOptions = [ "--ulimit" "nofile=10000:10000" ];
+    };
+
+    services.nginx.virtualHosts."${cfg.vhostName}" = {
+      forceSSL = true;
+      useACMEHost = cfg.vhostName;
+      locations."/" = { proxyPass = "http://127.0.0.1:7080"; };
+    };
+
+    security.acme.certs."${cfg.vhostName}}" = {
+      dnsProvider = "gcloud";
+      credentialsFile = secrets."acme/credentials".path;
+    };
+
+    my.services.backup = {
+      paths = [ "/var/lib/sourcegraph/etc" "/var/lib/sourcegraph/data" ];
+    };
+  };
+}